Skip to main content

CVE-2022-40226: CWE-384: Session Fixation in Siemens SICAM P850

Medium
Published: Tue Oct 11 2022 (10/11/2022, 00:00:00 UTC)
Source: CVE
Vendor/Project: Siemens
Product: SICAM P850

Description

A vulnerability has been identified in SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P850 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10), SICAM P855 (All versions < V3.10). Affected devices accept user defined session cookies and do not renew the session cookie after login/logout. This could allow an attacker to take over another user's session after login.

AI-Powered Analysis

AILast updated: 06/20/2025, 11:50:50 UTC

Technical Analysis

CVE-2022-40226 is a session fixation vulnerability identified in Siemens SICAM P850 and P855 devices, specifically affecting all versions prior to V3.10. The vulnerability arises because these devices accept user-defined session cookies and fail to renew the session cookie upon user login or logout. This improper session management allows an attacker to fixate a session identifier before the victim logs in, and subsequently hijack the authenticated session. The core issue is classified under CWE-384 (Session Fixation), which is a weakness where the application does not invalidate or regenerate session identifiers after authentication events, enabling attackers to impersonate legitimate users. The affected products, SICAM P850 and P855, are industrial control system (ICS) devices used primarily in power distribution and automation environments. Exploitation does not require sophisticated techniques but does require the attacker to have the ability to set or influence the session cookie prior to the victim’s login, which could be achieved via social engineering, network access, or other means. No known public exploits have been reported in the wild as of the publication date, and Siemens has not provided explicit patch links, though version 3.10 or later presumably addresses the issue. The vulnerability impacts the confidentiality and integrity of user sessions, potentially allowing unauthorized control or access to critical ICS functions if exploited successfully.

Potential Impact

For European organizations, particularly those in the energy and utilities sectors, this vulnerability poses a significant risk. SICAM P850 and P855 devices are widely deployed in European power grids and industrial automation systems. Successful exploitation could allow attackers to hijack sessions of authorized users, potentially gaining unauthorized access to control systems, altering operational parameters, or disrupting service availability. This could lead to operational downtime, safety hazards, and compromise of critical infrastructure. Given the strategic importance of energy infrastructure in Europe, such an attack could have cascading effects on national security and economic stability. The vulnerability’s exploitation could also undermine trust in industrial control systems and complicate compliance with regulatory frameworks such as NIS Directive and GDPR, especially if personal or operational data confidentiality is breached. Although no exploits are currently known in the wild, the medium severity rating and the critical nature of the affected systems warrant proactive mitigation.

Mitigation Recommendations

1. Immediate upgrade of all SICAM P850 and P855 devices to version 3.10 or later, where the session fixation issue is resolved. 2. Implement network segmentation and strict access controls to limit exposure of SICAM devices to untrusted networks and users, reducing the attack surface for session fixation attempts. 3. Deploy web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) capable of detecting anomalous session cookie manipulations or session hijacking attempts. 4. Enforce multi-factor authentication (MFA) on user access to SICAM management interfaces to reduce the risk of session hijacking leading to unauthorized control. 5. Conduct regular security audits and monitoring of session management logs to detect suspicious session reuse or anomalies. 6. Educate operational staff on risks of session fixation and social engineering tactics that could facilitate cookie fixation. 7. Where possible, implement additional session management controls such as IP address binding or short session timeouts to limit session hijacking windows. 8. Coordinate with Siemens support for any interim patches or recommended configuration changes if immediate upgrade is not feasible.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
siemens
Date Reserved
2022-09-08T00:00:00.000Z
Cisa Enriched
true

Threat ID: 682d984bc4522896dcbf8194

Added to database: 5/21/2025, 9:09:31 AM

Last enriched: 6/20/2025, 11:50:50 AM

Last updated: 7/26/2025, 11:32:36 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats